Data Privacy & Cybersecurity

Suit Says FTC Chair’s Presence During MGM Ransomware Attack Precludes Investigation

Suit Says FTC’s Presence During MGM Ransomware Attack Precludes Investigation

The MGM ransomware attack cost a minimum of $100 million in lost revenue. Now the FTC investigation is under objection by the casino.

Remote Access Vulnerability Caused Change Healthcare Ransomware Attack

Remote Access Vulnerability Caused Change Healthcare Ransomware Attack

Learn how inadequate authentication on a remote-access application may be the cause of the Change Healthcare ransomware attack.

Microsoft Corporate Email Hack Affects Federal Agencies

Microsoft Corporate Email Hack Affects Federal Agencies

The Cybersecurity and Infrastructure Agency (CISA) issued an emergency directive ordering agencies to address risks from the Microsoft corporate email breach.

Can Software Manufacturers Prevent Ransomware Attacks?

Can Software Manufacturers Prevent Ransomware Attacks?

Cybercrime plagues American businesses, but can software manufacturers prevent ransomware attacks?

woman at self service kiosk

What General Counsel Should Know About Kiosk Fraud Prevention

In today’s digital landscape, where credit cards are swiped virtually everywhere, bad actors can exploit sensitive information.

cyber security ransomware

You Wouldn’t Know It But Ransomware Groups Are Struggling

A 2022 drop in ransomware attacks led to a big decline in payouts to ransomware groups compared to 2021. Then 2023 happened.

ethical hacking concept

Privacy Litigation More Concerning than the Cost of Cyberattacks

Read why insurance underwriters and compliance attorneys worry more about privacy litigation than cyberattacks.

global energy crisis

Energy Sector Cyberattacks Increasing

Discover why energy sector cyberattacks are on the rise and how energy providers are fretting about the industry’s operational resilience.

stethoscope on dollars

Twist In Change Healthcare Ransom Attack

The RansomHub gang is leaking corporate and patient data stolen from a recent healthcare ransom attack in what experts call “double-extortion.”

cybersecurity logging in with username and password

Credential Stuffing Creates Cybersecurity Vulnerabilities

Learn how credential stuffing takes advantage of computer users reusing passwords over multiple platforms and how this can lead to security breaches.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top